Spelling suggestions: "subject:"[een] PROPAGATION MODELS"" "subject:"[enn] PROPAGATION MODELS""
1 |
Investigating the use of ray tracing for signal-level radar simulation in space monitoring applications: a comparison of radio propagation modelsMartin, Mogamat Yaaseen 11 September 2023 (has links) (PDF)
This thesis presents the design and development of an accelerated signal-level radar simulator with an emphasis on space debris monitoring in the Low Earth Orbit. Space surveillance represents a major topic of concern to astronomers as the threat of space debris and orbital overpopulation looms – particularly due to the lack of effective mitigation techniques and the limitations of modern space-monitoring sensors. This work thus aimed to investigate and design possible tools that could be used for training, testing and research purposes, and thereby aid further study in the field. At present, there exist no three-dimensional, ray-traced, signal-level radar simulators available for public use. As such, this thesis proposes an open-source, ray-traced radar simulator that models the interactions between spaceborne targets and terrestrial radar systems. This utilises a ray-tracing algorithm to simulate the effects of debris size, shape, orientation, and material properties when computing radar signals in a typical simulation. The generated received signals, produced at the output of the simulator, were also verified against systems theory, and validated with an existing, well-established simulator. The developed software was designed to aid astronomers and researchers in space situational awareness applications through the simulation of radar designs for orbital surveillance experiments. Due to its open-source nature, it is also expected to be used in training and research environments involving the testing of space-monitoring systems under various simulation conditions. The software offers native support for measured Two-Line Element datasets and the Simplified General Perturbations #4 orbit propagation model, enabling the accurate modelling of targets and the dynamic orbital forces acting upon them. As a result, the software has aptly been named the Space Object Astrodynamics and Radar Simulator – or SOARS. SOARS was built upon the foundations of a general-purpose radar simulator known as the Flexible Extensible Radar Simulator – or FERS – which provided integrated radar models for propagation loss, antenna shapes, Doppler and phase shifts, Radar Cross Section modelling, pulse waveforms, high-accuracy clock mechanisms, and interpolation algorithms. While FERS lacked various features required for space-monitoring applications, many of its implementations were used in SOARS to minimise simulation limits and maximise signal rendering accuracy by supporting an arbitrary number of transmitters, receivers, and targets. The goal was thus to have the simulator limited only by the end-user's system, and to specialise the operation of the software towards space surveillance by integrating additional features – such as built-in models for environmental and system noise, multiscatter effects, and target modelling using meshes comprised of triangular primitives. After completing the software's development, the ray-traced simulator was compared against a more streamlined version of SOARS that made use of point-model approximations for quick-look simulations, and the trade-offs between both simulators (including software runtime, memory utilisation and simulation accuracy) were investigated and evaluated. This assessed the value of implementing ray tracing in a radar simulator operating primarily within space contexts and evaluated the results of both simulators using detection processing as a demonstrated application of the system. And while the use of ray tracing resulted in significant costs in speed and memory, the investigation found that the ray-traced simulator generated more reliable results relative to the point-model version – providing various advantages in test scenarios involving shadowing and multiscatter. The design of the SOARS software, as well as its point-model “baseline” alternative and the investigation into each simulator's advantages and disadvantages, are thus presented in this thesis. The developed programs were released as open-source tools under the GNU General Public Licence and are freely available for public use, modification, and distribution.
|
2 |
Approximation of Antenna Patterns With Gaussian Beams in Wave Propagation Models.Sherkat, Navid January 2011 (has links)
The topic of antenna pattern synthesis, in the context of beam shaping, is considered. One approach to this problem is to use the method of point matching. This method can be used to approximate antenna patterns with a set of uniformly spaced sources with suitable directivities. One specifies a desired antenna pattern and approximates it with a combination of beams. This approach results in a linear system of equations that can be solved for a set of beam coefficients. With suitable shifts between the matching points and between the source points, a good agreement between the assumed and the reproduced antenna patterns can be obtained along an observation line. This antenna modelling could be used in the program NERO to compute the field at the receiver antenna for a realistic 2D communication link. It is verified that the final result is not affected by the details of the antenna modelling.
|
3 |
Mechanisms for Enhancing Spectrum Utilization in a Spectrum Access SystemUllah, Abid 07 March 2017 (has links)
Multi-antenna systems with resource allocation based on transmit and receive precoding matrices have proven to enhance the spectral efficiency of cellular systems. In this thesis, we extend these concepts to a spectrum sharing system with primary users and secondary users. The spectrum sharing area is modeled as an array of transmit and receive antennas, with the transmit power constraint defined as a function of the interference threshold of the primary user. The area covered by a database enabled spectrum access system is represented as spatial bins, which are regions of predefined sizes. Each bin is assumed to have a single secondary user base station and all the resources of that bin (i.e., available frequencies, transmit power, etc.) are consumed by this secondary user in that bin. With these assumptions, the service area of the database can be represented by a grid of secondary users. Such a grid of secondary users forms a array of transmit antennas with secondary users in each bin. Furthermore, the set of bins with its secondary users at the edge of the exclusion zone of the primary user are assumed to create an array of receive antennas. These receive antennas act as sensors that will measure the interference power at the edge of the exclusion zone of the primary users. So the overall system of secondary user base station transmit and receive antennas can be modeled as a multi-element antenna array system.
A regulatory interference threshold (I<sub>th</sub>) is defined for protection of the primary user at the edge of exclusion zones. This interference threshold is used by the resource allocation algorithms in the spectrum access system to calculate the transmit and receive precoding matrices for the secondary user antenna array. Using multiple-input multiple-output theory, the receive antenna array will measure the interference from the transmit antenna array and a feedback mechanism will update the resource allocation to keep the power at the receive array below the interference threshold of the primary user. For each array, the transmit/receive matrix is a beamforming vector which consists of a set of weights, one for each antenna. Furthermore, a codebook-based strategy is used by the spectrum access system database to choose a transmit matrix from the codebook which minimizes the interference at the primary user.
The overall spectrum sharing system can be represented by a model based on four design parameters, namely, Δ = (I<sub>th</sub>, P, V, B), where P is the transmit power constraint, V are the transmit and receive beamforming matrices, and B is the matrix with active secondary user base stations of the antenna array or the quality of service level of the secondary users. The Δ parameter is called the system index of the spectrum sharing system. We apply the multi-antenna model to the challenging problem of spectrum sharing where the primary users operational parameters, such as transmit power levels, waveform types, and service modes, can change with time. Moreover, there are several types of primary users in different bands. Most of these users are federal government systems and their operational parameters are not available to the spectrum access system database. Our framework is useful in sharing spectrum with federal primary users, since only the interference threshold is needed for sharing their bands. Furthermore, we quantify the uncertainty in the availability of these bands for secondary users and the variations in achievable capacity with sharing spectrum in these bands. / Ph. D. / The goal of this thesis is to build a Protected Shared Access Model (PSAM) [1] through database enabled Spectrum Access System (SAS). A model for the SAS is proposed, which is based on our vision for the SAS as a more dynamic and responsive architecture as a geolocation database than the current TVWS database. Major functions and capabilities of the model include, calculations of exclusion zone (EZ) of primary users with different operational parameters, use interference estimation techniques for predicting interference levels that will be generated by the new secondary users (SUs) and existing systems operating in the database service area, allocate location based transmit power levels and provide an algorithm for communications among the PUs, SUs, and the SAS to implement management and authorization framework of spectrum resources to different types of SUs.
The selection of a propagation model is of utmost importance in spectrum sharing studies. Existing literature on EZs with simplified propagation models does not consider the effect of LOS interference between the PU to SU link and SU to PU link on peak points in the terrain area around the PU. The use of a terrain profile based model captures the essence of propagation over irregular terrain. Terrain regions that are far away from the PU may have a LOS between the PU and SU. So its not only the nearest area where the PU/SU can get interference, but interference is present from areas further away on high grounds having a direct LOS with the PU antenna. The exclusion zone computation with terrain profile based propagation model captures this effect, and it is the same effect that makes the shape of the exclusion zone irregular. So the propagation model used in spectrum sharing studies must be able to use the terrain for the specific geographical area for precise propagation calculations, and provide statistical reliability parameters for the computed propagation values for area of interest.
For a multi-tier shared access model with incumbent access (IA) users, priority access (PA) users and general authorized access (GAA) users. The SU interference tolerance thresholds varies by the type of SU’s i-e., PA users like public safety systems and mission critical users have low tolerance for interference and hence need to operate further from the PU. While GAA users like commercial broadband systems have higher interference tolerances and can operate closer to the PU. This multi-tier shared access model requires varying levels of interference protection from PU, that can be provided with multiple exclusion zones [2] defined for different types of SU’s.
We propose the concept of <i>differential spectrum access hierarchy</i>, and define it in the context of a multi-tiered EZs that are based on quantiles of tolerable interference levels for different tiers of SUs. We also quantify and show the gain in SU capacity (or throughput) obtained by using multi-tiered EZs for different tiers of SUs. Using simulation results, we show that the size of EZs can be significantly reduced with the use of a terrain profile-based propagation model that takes into account terrain profile for signal attenuation between PUs and SUs in the P2P link.
The exclusion zones involve the use of interference test points at the circumference of the protection contour of the PU. They are monitoring test points that the SAS uses with a propagation model and locations of SUs to calculate interference [3]. Consider a model of Figure 5.1, the coexistence environment with PU, SU and the SAS with a database. As more SUs enter the system, their transmit powers creates interference for the PUs. In the event of SU interference exceeding a predefined threshold level at any of the test points, the SAS uses an interference based power control algorithm to turnoff the nearest dominant interferer’s. Turning off the dominant interferers eliminates interference generated by that node at the PU. This nearest node interference cancellation significantly reduces the outage probability at the PU.
Unlike existing metrics for spectrum utilization efficiency that considers separate metrics for PU interference protection and maximum use of the band for secondary use [4] [5]’we define a new metric for spectrum utilization efficiency. This metric uses utility functions and cost functions to measure the impact of secondary use of the spectrum on PUs as well as the degree of satisfaction SUs can achieve from reuse of such spectrum [6]. The new spectrum utilization metric is used to evaluate tradeoffs between interference protection of PUs and SU spectrum utilization.
|
4 |
An investigation into the use of kriging for indoor Wi-Fi received signal strength estimation / Petrus Jacobus JoubertJoubert, Petrus Jacobus January 2014 (has links)
Kriging is proposed as a tool for Wi-Fi signal strength estimation for complex indoor
environments. This proposal is based on two studies suggesting that kriging might be
suitable for this application. Both of these studies have shortcomings in supporting this
proposal, but their results encourage a more in depth investigation into this.
Even though kriging is a geostatistical method developed for geographical interpolation,
it has been used successfully in a wide range of other applications as well. This further
suggests that kriging might be a versatile method to overcome some of the difficul-
ties of existing signal strength estimation methods. Two main types of signal strength
estimation are deterministic methods and empirical methods. Deterministic methods
are generally very complex and requires input parameters that are difficult to obtain.
Empirical methods are known to have low accuracy which makes them unreliable for
practical use.
Three main investigations are presented in order to evaluate the use of kriging for this
application. A sampling plan is proposed as part of a generic application protocol for
the practical use of kriging for Wi-Fi signal strength. It is concluded that kriging can be
conffidently used as an estimation technique for Wi-Fi signal strength in complex indoor
environments. Kriging is recommended for practical applications, especially where in-
sufficient information is available about a building or where time consuming site surveys
are not feasible. / MIng (Computer and Electronic Engineering), North-West University, Potchefstroom Campus, 2015
|
5 |
An investigation into the use of kriging for indoor Wi-Fi received signal strength estimation / Petrus Jacobus JoubertJoubert, Petrus Jacobus January 2014 (has links)
Kriging is proposed as a tool for Wi-Fi signal strength estimation for complex indoor
environments. This proposal is based on two studies suggesting that kriging might be
suitable for this application. Both of these studies have shortcomings in supporting this
proposal, but their results encourage a more in depth investigation into this.
Even though kriging is a geostatistical method developed for geographical interpolation,
it has been used successfully in a wide range of other applications as well. This further
suggests that kriging might be a versatile method to overcome some of the difficul-
ties of existing signal strength estimation methods. Two main types of signal strength
estimation are deterministic methods and empirical methods. Deterministic methods
are generally very complex and requires input parameters that are difficult to obtain.
Empirical methods are known to have low accuracy which makes them unreliable for
practical use.
Three main investigations are presented in order to evaluate the use of kriging for this
application. A sampling plan is proposed as part of a generic application protocol for
the practical use of kriging for Wi-Fi signal strength. It is concluded that kriging can be
conffidently used as an estimation technique for Wi-Fi signal strength in complex indoor
environments. Kriging is recommended for practical applications, especially where in-
sufficient information is available about a building or where time consuming site surveys
are not feasible. / MIng (Computer and Electronic Engineering), North-West University, Potchefstroom Campus, 2015
|
6 |
Διερεύνηση παραμέτρων σχεδίασης ασύρματου μητροπολιτικού δικτύου στις ζώνες 2.4GHz και 5GHzΙσμαήλ, Ιωσήφ 08 January 2013 (has links)
Στο πρώτο κεφάλαιο γίνεται μία εισαγωγή στην βασική θεωρία ασύρματης τεχνολογίας. Παρουσιάζονται βασικά χαρακτηριστικά όπως το φάσμα, η διάδοση, οι παρεμβολές και η διάθλαση, οι συχνότητες και τα κανάλια. Ακολουθεί η θεωρία κεραιών, η τοπολογία δικτύων και η εφαρμογή όλων των παραπάνω στα ασύρματα μητροπολητικά δίκτυα.
Στο δεύτερο κεφάλαιο παρουσιάζονται τα πρωτόκολλα ασύρματων δικτύων και η εφαρμογή τους, στις ζώνες 2,4GHz και 5GHz και η σύγκριση των δύο παραπάνω ζωνών. Ακολουθεί η διευθυνσιοδότηση του δικτύου με το πρωτόκολλο IP και ο διαμοιρασμός του υποδικτύου 10.0.0.0/8 σε Β-class διευθύνσεις για κάθε νομό. Τέλος παρουσιάζονται τα πρωτόκολλα δρομολόγησης δικτύων και τα πλεονεκτήματα της χρήσης στατικής ή δυναμικής δρομολόγησης στα ασύρματα μητροπολιτικά δίκτυα.
Στο τρίτο κεφάλαιο γίνεται διερεύνηση στα μοντέλα ηλεκτρομαγνητικής κάλυψης ανοικτών χώρων. Πιο συγκεκριμένα, παρουσιάζονται τα μοντέλα Free space loss, Hata, Walfisch-Bertoni και Walfisch – Ikegami, και οι παράμετροι και ο τρόπος εφαρμογής τους για τον υπολογισμό των απωλειών στον χώρο διάδοσης.
Στο τέταρτο κεφάλαιο επιδιώκεται η εφαρμογή μοντέλων του κεφαλαίου 3 στα ασύρματα μητροπολιτικά δίκτυα με σκοπό την μοντελοποίηση τους. Γίνονται μετρήσεις σε ασύρματους σταθμούς βάσης σε αστική και ημιαστική περιοχή για τις ζώνες 2.4GHz και 5GHz. Ακολουθεί ο υπολογισμός του μέσου σφάλματος των μοντέλων του κεφαλαίου 3 για τα σημεία μετρήσεων και ο έλεγχος της αξιοπιστίας τους ώστε να είναι εφικτή η εφαρμογή των μοντέλων στις ζώνες 2.4GHz και 5GHz οι οποίες δεν ανήκουν στο εύρος συχνοτήτων που υποστηρίζουν τα μοντέλα. Σκοπός της παραπάνω διαδικασίας είναι η δυνατότητα εύρεσης της βέλτιστης θέσης σταθμών βάσης πριν την εγκατάστασή τους και η βελτιστοποίηση της θέσης υπαρχόντων σταθμών βάσης. / The first chapter is an introduction to the basic theory of wireless technology. Presents key characteristics such as range, propagation, interference and diffraction, frequencies and channels. Next, we represent the theory of antennas, network topology and application of the above in wireless metropolitan networks.
In the second chapter there are presented the protocols of wireless networks and their application in zones 2,4 GHz and 5GHz and the comparison of these two zones. Below addressing network with the IP protocol and sharing the subnet 10.0.0.0 / 8 to B-class addresses for each county. Finally we represent the routing protocols and the advantages of using static or dynamic routing in wireless metropolitan area networks.
The third chapter is exploring electromagnetic models covering open spaces. More specifically, we present the models Free space loss, Hata, Walfisch-Bertoni and Walfisch - Ikegami, and their parameters and how they are applied to calculate the loss in space propagation.
In the fourth we try to apply the models of Chapter 3 in wireless metropolitan area networks in order to model them. We Perform measurements in wireless base stations in urban and suburban areas for the bands 2.4GHz and 5GHz. Followed by the calculation of the average error of the models of Chapter 3 points for measurement and control reliability so as to enable the application of models to 2.4GHz and 5GHz bands which do not belong to the range of frequencies that support the models. The purpose of this procedure is the finding of the optimal location of base stations before their installation and optimize the position of existing base stations.
|
7 |
Indoor Propagation Modeling at 2.4 GHz for IEEE 802.11 NetworksTummala, Dinesh 12 1900 (has links)
Indoor use of wireless systems poses one of the biggest design challenges. It is difficult to predict the propagation of a radio frequency wave in an indoor environment. To assist in deploying the above systems, characterization of the indoor radio propagation channel is essential. The contributions of this work are two-folds. First, in order to build a model, extensive field strength measurements are carried out inside two different buildings. Then, path loss exponents from log-distance path loss model and standard deviations from log-normal shadowing, which statistically describe the path loss models for a different transmitter receiver separations and scenarios, are determined. The purpose of this study is to characterize the indoor channel for 802.11 wireless local area networks at 2.4 GHz frequency. This thesis presents a channel model based on measurements conducted in commonly found scenarios in buildings. These scenarios include closed corridor, open corridor, classroom, and computer lab. Path loss equations are determined using log-distance path loss model and log-normal shadowing. The chi-square test statistic values for each access point are calculated to prove that the observed fading is a normal distribution at 5% significance level. Finally, the propagation models from the two buildings are compared to validate the generated equations.
|
8 |
Modélisation et étude de performances dans les réseaux VANET / Modelling and performance study in VANET networksAit Ali, Kahina 16 November 2012 (has links)
Les réseaux véhiculaires sont des systèmes de communication basés sur un échange d'informations de véhicules à infrastructures fixes installées au bord des routes, on parle alors de mode V2I (Vehicle-to-Infrastructure), ou de véhicules à véhicules dit mode V2V (Vehicle-to-Vehicle) ou VANET (Vehicular Ad hoc Network). L'objectif est de fournir aux conducteurs et aux opérateurs de transport des informations sur le trafic routier permettant d'améliorer l'efficacité des systèmes de transport, la sécurité et le confort des usagers. Depuis leur apparition, les VANET ont connu un très grand essor, de nombreux standards, applications et mécanismes de routage ont été proposés pour répondre aux spécificités de cette nouvelle classe de réseaux. Les défis à relever pour leur conception découlent principalement de la forte mobilité des véhicules, de la diversité spatio-temporelle de la densité du trafic et de la propagation des ondes radio en environnement extérieur défavorable à l'établissement des communications sans fil. La difficulté, aussi bien économique que logistique, de la mise en œuvre réelle des réseaux véhiculaires fait de la simulation le moyen le plus largement utilisé pour la conception et l'évaluation des solutions proposées. Cependant la validité des résultats de simulation dépend fortement de la capacité des modèles utilisés à reproduire le plus fidèlement possible les situations réelles. Deux aspects sont essentiellement importants dans les VANET : la mobilité des véhicules et la propagation des ondes radio. Nous proposons dans cette thèse un nouveau modèle de mobilité et un nouveau modèle de propagation d’ondes radio pour réseaux de véhicules en environnement urbain et suburbain. Pour définir des schémas réalistes, ces deux modèles se basent sur des données statiques et dynamiques réelles sur les caractéristiques topographiques et socio-économiques de l'environnement. Ces données décrivent particulièrement la distribution spatio-temporelle des véhicules et les infrastructures présentes dans l'environnement. Trois cas d'études sont présentés dans la thèse pour la validation des modèles développés ; un environnement théorique, urbain ou suburbain, défini par l'utilisateur, notamment le cas Manhattan très utilisé, et deux environnements réels qui représentent des agglomérations de taille moyenne. Une autre contribution de cette thèse est l'étude de la connectivité radio et des performances des protocoles de routage dans les VANET. A partir de graphes dynamiques de connexions représentant la variation des liens radio entre véhicules en déplacement, nous avons analysé et déterminé les propriétés de la topologie des liaisons radio des réseaux véhiculaires. Pour étudier les protocoles de routage, nous avons utilisé le modèle de mobilité et le modèle de propagation radio que nous avons développés en association avec le simulateur de réseaux ns-2. Nous avons comparé les performances des protocoles de routage les plus répandus et déterminé les mécanismes de routage les plus adaptés aux réseaux véhiculaires. / Vehicular networks are communication systems based on information exchange either between vehicles and roadside fixed infrastructure, which is called V2I (Vehicle-to-Infrastructure) mode, or from vehicle to vehicle V2V (Vehicle-to-Vehicle) mode also known as VANET (Vehicular Ad hoc Network). The objective of these networks is to provide drivers and transport authorities the most timely information on road traffic in order to improve the efficiency of transportation systems, users safety and comfort.Since their appearance, the VANET have been greatly developed; many standards, applications and routing mechanisms have been proposed to address the specifics of this new class of networks. The challenges arise mainly from the high vehicles mobility, the spatiotemporal diversity of traffic density and, the radio waves propagation in external environment unfavorable to wireless communications establishment.The difficulty, both economic and logistical, of a real implementation of vehicular networks makes the simulation widely used to conceive and assess the proposed solutions. The validity of simulation results depends strongly on the ability of the models to reproduce as faithfully as possible the real situations. Two aspects are mainly important in the VANET: the simulation of vehicles mobility and radio wave propagation.We propose in this thesis a new mobility model and a new radio propagation model for vehicular networks in urban and suburban environment. To be realistic, these two models are based on real static and dynamic data describing the topographic and socioeconomic characteristics of the environment. These data concern particularly the spatiotemporal vehicles distribution and the description of the infrastructures present in the environment. Three case studies are presented in the thesis to validate the models, a theoretical user-defined urban or suburban environment (the Manhattan case very often used) and two real environments from mean size cities.Another contribution of this thesis is the study of radio connectivity and performance of routing protocols in the VANET. From dynamic graphs representing the variation of the radio links between vehicles in motion, we have analyzed and determined the topology properties of vehicular networks. To study routing protocols, we used the mobility model and the radio propagation model in association with the network simulator ns-2. We have compared the performance of the widespread routing protocols and determined the most adapted routing mechanisms to vehicular networks.
|
9 |
Μοντέλα διάδοσης απειλών σε δίκτυα υπολογιστών : ένα προτεινόμενο μοντέλοΒαβίτσας, Γιώργος 28 May 2009 (has links)
Τα τελευταία χρόνια το Διαδίκτυο αναπτύσσεται και επεκτείνεται με εκθετικούς ρυθμούς τόσο σε επίπεδο πλήθους χρηστών όσο και σε επίπεδο παρεχόμενων υπηρεσιών. Η ευρεία χρήση των κατανεμημένων βάσεων δεδομένων, των κατανεμημένων υπολογιστών και των τηλεπικοινωνιακών εφαρμογών βρίσκει άμεση εφαρμογή και αποτελεί θεμελιώδες στοιχείο στις επικοινωνίες, στην άμυνα, στις τράπεζες, στα χρηματιστήρια, στην υγεία, στην εκπαίδευση και άλλους σημαντικούς τομείς. Το γεγονός αυτό, έχει κάνει επιτακτική την ανάγκη προστασίας των υπολογιστικών και δικτυακών συστημάτων από απειλές που μπορούν να τα καταστήσουν τρωτά σε κακόβουλους χρήστες και ενέργειες. Αλλά για να προστατεύσουμε κάτι θα πρέπει πρώτα να καταλάβουμε και να αναλύσουμε από τι απειλείται.
Η διαθεσιμότητα αξιόπιστων μοντέλων σχετικά με τη διάδοση απειλών στα δίκτυα υπολογιστών, μπορεί να αποδειχθεί χρήσιμη με πολλούς τρόπους, όπως το να προβλέψει μελλοντικές απειλές ( ένα νέο Code Red worm) ή να αναπτύξει νέες μεθόδους αναχαίτισης. Αυτή η αναζήτηση νέων και καλύτερων μοντέλων αποτελεί ένα σημαντικό τομέα έρευνας στην ακαδημαϊκή και όχι μόνο κοινότητα.
Σκοπός της παρούσης εργασίας είναι η παρουσίαση κάποιων βασικών επιδημιολογικών μοντέλων και κάποιων παραλλαγών αυτών. Αναλύουμε για κάθε μοντέλο τις υποθέσεις που έχουν γίνει, τα δυνατά και αδύνατα σημεία αυτών. Αυτά τα μοντέλα χρησιμοποιούνται σήμερα εκτεταμένα προκειμένου να μοντελοποιηθεί η διάδοση αρκετών απειλών στα δίκτυα υπολογιστών, όπως είναι για παράδειγμα οι ιοί και τα σκουλήκια ( viruses and worms). Θα πρέπει εδώ να αναφέρουμε ότι οι ιοί υπολογιστών και τα σκουλήκια (worms) είναι οι μόνες μορφές τεχνητής ζωής που έχουν μετρήσιμη επίδραση-επιρροή στη κοινωνία. Επίσης αναφέρουμε συγκεκριμένα παραδείγματα όπως το Code Red worm, τον οποίων η διάδοση έχει χαρακτηριστεί επιτυχώς από αυτά τα μοντέλα.
Τα επιδημιολογικά αυτά μοντέλα που παρουσιάζουμε και αναλύουμε είναι εμπνευσμένα από τα αντίστοιχα βιολογικά, που συναντάμε σήμερα σε τομείς όπως είναι για παράδειγμα ο τομέας της επιδημιολογίας στην ιατρική που ασχολείται με μολυσματικές ασθένειες.
Αναλύουμε τις βασικές στρατηγικές σάρωσης που χρησιμοποιούν σήμερα τα worms προκειμένου να βρουν και να διαδοθούν σε νέα συστήματα. Παρουσιάζουμε τα πλεονεκτήματα και μειονεκτήματα αυτών.
Επίσης παρουσιάζουμε αναλυτικά κάποιες βασικές κατηγορίες δικτύων που συναντάμε σήμερα και χαρακτηρίζουν τα δίκτυα υπολογιστών. Η γνώση αυτή που αφορά την τοπολογία των δικτύων είναι ένα απαραίτητο στοιχείο που σχετίζεται άμεσα με τη διάδοση κάποιων απειλών που μελετάμε στη συγκεκριμένη εργασία.
Τέλος παρουσιάζουμε και αναλύουμε ένα δικό μας μοντέλο διάδοσης απειλών με τη χρήση ενός συστήματος διαφορικών εξισώσεων βασιζόμενοι στο θεώρημα του Wormald. Θεωρούμε ότι τα δίκτυα email, Instant messaging και P2P σχηματίζουν ένα social δίκτυο. Αυτά τα δίκτυα μακροσκοπικά μπορούν να θεωρηθούν σαν μία διασύνδεση ενός αριθμού αυτόνομων συστημάτων. Ένα αυτόνομο σύστημα είναι ένα υποδίκτυο που διαχειρίζεται από μία και μόνο αρχή. Παρουσιάζουμε λοιπόν ένα μοντέλο διάδοσης βασισμένο σε αυτή τη δομή δικτύου που θα αναλύσουμε, καθώς και στις συνήθειες επικοινωνίας των χρηστών. Το μοντέλο αυτό ενσωματώνει τη συμπεριφορά των χρηστών με βάση κάποιες παραμέτρους που ορίζουμε. Επίσης προτείνουμε ένα πιο ρεαλιστικό μοντέλο σχετικά με τη προοδευτική ανοσοποίηση των συστημάτων. Η μοντελοποίηση του δικτύου έγινε με βάση το Constraint Satisfaction Problem (CSP). Χρησιμοποιώντας αυτό το μοντέλο που προτείνουμε, μπορούμε να καθορίσουμε τη διάδοση κάποιων απειλών όταν δεν έχουμε εγκατεστημένο κάποιο πρόγραμμα προστασίας ή σωστά ενημερωμένους χρήστες. / In recent years the Internet grows and expands exponentially rates at many levels of users and service level. The widespread use of distributed databases, distributed computing and telecommunications applications is directly applicable and is an essential element in the communications, defense, banks, stock exchanges in the health, education and other important areas. This has made imperative the need to protect computer and network systems from threats that may make them vulnerable to malicious users and actions. But to protect something you must first understand and analyze what is threatened.
The availability of reliable models for the spread of threats to computer networks, may prove useful in many ways, such as to predict future threats (a new Code Red worm) or develop new methods of containment. This search for new and better models is an important area of research in the academic community and not only.
The purpose of this work is to present some basic epidemiological models and some variations thereof. We analyze each model assumptions made, the strengths and weaknesses of these. These models are currently used extensively to disseminate montelopoiithei several threats to computer networks, eg viruses and worms (viruses and worms). It should be mentioned here that the computer viruses and worms (worms) are the only artificial life forms that have a measurable impact-influence in society. Also cite specific examples, such as Code Red worm, whose spread has been described successfully by these models.
Epidemiological models are presented and analyzed are inspired by their biological, which have been created in areas such as for example the field of epidemiology in medicine that deals with infectious diseases.
We analyze the basic scanning strategies used today to find worms and spread to new systems. We present the advantages and disadvantages of these.
Also present in detail some basic types of networks which have been characterized and computer networks. This knowledge on the topology of networks is an essential element directly related to the dissemination of some threats are studying in this work.
Finally we present and analyze our own model proliferation threats using a system of differential equations based on the theorem of Wormald. We believe that networks email, Instant messaging and P2P form a social network. These networks can be considered macroscopically as an interconnection of a number of autonomous systems. An autonomous system is a subnet managed by a single authority. Presents a diffusion model based on the network structure to be analyzed, and the communication habits of users. This model incorporates the behavior of users based on some parameters set. Also propose a more realistic model of the progressive immune systems. The modeling system was based on the Constraint Satisfaction Problem (CSP). Using this model we propose, we can determine the spread of some threats when we have established a protection program or properly informed users.
|
10 |
Implementation of a 3D terrain-dependent Wave Propagation Model in WRAPBlakaj, Valon, Gashi, Gent January 2014 (has links)
The radio wave propagation prediction is one of the key elements for designing an efficient radio network system. WRAP International has developed a software for spectrum management and radio network planning.This software includes some wave propagation models which are used to predict path loss. Current propagation models in WRAP perform the calculation in a vertical 2D plane, the plane between the transmitter and the receiver. The goal of this thesis is to investigate and implement a 3D wave propagation model, in a way that reflections and diffractions from the sides are taken into account.The implemented 3D wave propagation model should be both fast and accurate. A full 3D model which uses high resolution geographical data may be accurate, but it is inefficient in terms of memory usage and computational time. Based on the fact that in urban areas the strongest path between the receiver and the transmitter exists with no joint between vertical and horizontal diffractions [10], the radio wave propagation can be divided into two parts, the vertical and horizontal part. Calculations along the horizontal and vertical parts are performed independently, and after that, the results are combined. This approach leads to less computational complexity, faster calculation time, less memory usage, and still maintaining a good accuracy.The proposed model is implemented in C++ and speeded up using parallel programming techniques. Using the provided Stockholm high resolution geographical data, simulations are performed and results are compared with real measurements and other wave propagation models. In addition to the path loss calculation, the proposed model can also be used to estimate the channel power delay profile and the delay spread.
|
Page generated in 0.0435 seconds